Our ThreatSim® Phishing Simulations allow you to assess your organization’s vulnerability to malicious link-based, attachment-based, and data entry-based emails without exposing your network to an actual attack. You can deliver a Teachable Moment to each user who interacts with a simulated attack, raising awareness in the moment and setting the stage for follow-up training.
Our robust reporting capabilities allow you to thoroughly examine and compare the results of your phishing tests and view campaign data in multiple formats to give you a high-level view of your efforts as well as granular insights. Administrators can tailor reports to include specific campaigns, time ranges, and/or campaign types; save different data views; export to multiple formats (including .xls, .csv, and .pdf) for additional analysis and sharing; and more.
ThreatSim business intelligence features allow you to track and analyze the results of individual and multiple simulated phishing campaigns. You’ll have access to a variety of valuable metrics:
- Open rates and click rates
- Time-to-click, open, and report
- Users who enter data on data entry phishing assessments
- Users who interact with multiple phishing assessments
- Types of devices, operating systems, and browsers used by employees who fell for mock attacks
- Worldwide mapping of user activity
- Data related to the optional Weak Network Egress feature, which can identify users whose PCs have out-of-date browser plug-ins and permissive egress rules
- Users who acknowledged viewing the Teachable Moment
Our PhishAlarm email reporting tool is included with our ThreatSim Phishing Simulations, and this email client add-in allows employees to report suspicious messages to your security and incident response teams with a single mouse click.
PhishAlarm Analyzer is an optional add-on for PhishAlarm, and this cloud-based analysis utilizes machine learning to categorize and prioritize the emails reported via PhishAlarm, which enables faster remediation of the most dangerous threats on your network.
PhishAlarm and PhishAlarm Analyzer reports give you access to the following information:
- The users who reported emails
- The types of emails reported (potential phish vs. simulated attacks)
- The number and types of reported threats identified over time (hours, day, weeks, months, quarters)
Our CyberStrength Knowledge Assessments give you the ability to assess end-user understanding of a range of pertinent cybersecurity topics, including phishing and social engineering attacks, password best practices, mobile device safeguards, and more. Administrators can build knowledge assessments using our library of 150+ questions, create their own custom questions, and choose from ten Predefined CyberStrength options that help to streamline the administrative process.
CyberStrength reports give you an at-a-glance view of strengths and weaknesses and allow you to tailor follow-up training efforts to address the most important topics in different areas of your organization. These security awareness reports allow you to review key factors related to your assessments, including the following:
- Individual, group, and overall scores
- Benchmarking data that compares your users’ scores to other end users around the world
- Scores by topic/category
- Most missed questions
- Completion status
Our ThreatSim Smishing and USB Simulations can help you gauge your employees’ understanding of the dangers associated with SMS/text phishing and USB-based attacks. These unique assessments can protect your corporate systems from malware, spyware, and other dangerous software.
Both of these services are managed by the Wombat Support team in coordination with you and/or your program administrator(s). However, reporting features are always accessible to your organization as your licensed service progresses, which means you’ll have ready visibility into the following:
- Users who fell for a simulated smishing attack, and those who viewed or clicked the message
- The number of USB devices that were accessed and the IP addresses of the users who fell for the simulated USB drop
- The number of unique responses per USB device planted in your location
We offer a library of more than 30 training modules about a wide range of cybersecurity and compliance-related topics. Education is critical to behavior change, and we design our interactive modules based on industry-proven Learning Science Principles to deliver training that engages end users, imparts actionable knowledge, and improves overall security postures. Customizable Training Jackets allow you to insert content specific to your organization as well as policy acknowledgements and training completion certificates.
Our business intelligence features and security dashboards allow you to go well beyond “completed/not completed” tracking and get more detailed, actionable metrics related to your training assignments. Many reports offer the option to filter by module, date, assignment, and/or custom user property to allow you to find exactly the data you need to make an action plan for your users. You’ll have access to the following data within our LMS:
- Comprehensive and granular views of assignment details, including user-level and module-level statistics
- Average scores for each training assignment
- Most-missed questions within modules
- Policy acknowledgement rates
- Dashboard-like view of top individual performers, completion progress, and best-performing departments
- Side-by-side comparisons of up to 25 assignments
Our patented Education Triggers solution allows you to seamlessly deliver education at the desktop, effectively marrying your endpoint and end-user remediation efforts. This product is currently available for Wombat customers who also utilize Carbon Black Enterprise Response, an advanced endpoint threat detection and response solution that identifies (among other issues) end users who have received emails with, or downloaded, potentially dangerous files, as well as users who are exhibiting potentially risky online behaviors.
By integrating Wombat’s security awareness training tools with their scans, dangerous actions become Education Triggers. Organizations can use this joint solution to sense and interrupt risky employee actions, and then deliver Teachable Moments to lower their overall cybersecurity risk. We measure actions in terms of “triggers,” “hits,” and “responses”:
- Trigger = a user behavior (e.g., accessing a public cloud sharing service like Dropbox)
- Hit = a single instance of a trigger (e.g., accessing Dropbox once)
- Response = the Teachable Moment sent in following a certain number of hits to a specific trigger, based on a threshold set by the administrator (e.g., if a user accesses Dropbox three times, a Teachable Moment is sent to the user)
Our reporting features give you access to the following data points:
- The total number of hits across all users and triggers
- Number of hits and responses sent to users
- Detailed insights into the Carbon Black information generated by the hit